QUESTIONYour network contains two clusters. The clusters are configured as shown in the following table.All of the servers in both of the clusters run Windows Server 2012. You need to plan the application of Windows updates to the nodes in the cluster. What should you include in the plan? More than one answer choice may achieve the goal. Select the BEST answer.

QUESTIONYour network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1. You deploy a new standalone server named Server2. You install the Hyper-V server role on Server2. Another administrator named Admin1 plans to create a replica of VM1 on Server2. You need to ensure that Admin1 can configure Server2 to receive a replica of VM1. To which group should you add Admin1?

QUESTIONYour network contains an Active Directory domain named contoso.com. The domain contains 20 servers that run Windows Server 2012. The domain contains a Microsoft System Center 2012 infrastructure. A web application named WebApp1 is installed on the 20 servers. You plan to deploy a custom registry key for WebApp1 on the 20 servers. You need to deploy the registry key to the 20 servers. The solution must ensure that you can verify whether the registry key was applied successfully to the servers. What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

A. From Operations Manager, create a monitor.B. From the Group Policy Management console, create a Group Policy object (GPO).C. From Configuration Manager, create a Compliance Settings.D. From Orchestrator Runbook Designer, create a runbook.

QUESTIONYour network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage device. The device only supports two connected computers. Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1. Currently, Server2 is used only to run backup software. You install the iSCSI Target Server role service on Server2. You need to ensure that the iSCSI targets are available if Server1 fails. Which five actions should you perform? To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order.Answer: Explanation:http://blogs.msdn.com/b/clustering/archive/2012/05/01/10299698.aspx

QUESTIONYour network contains multiple servers that run Windows Server 2012. You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.You need to identify the minimum number of physical disks required for each virtual disk.How many disks should you identify? To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.Answer: Explanation:http://technet.microsoft.com/es-es/library/jj822938.aspxThey are not talking about Clusters, a single server only, so a standalone server.

QUESTIONYour network contains an Active Directory domain named contoso.com. You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012. Users use the name intranet.contoso.com to request the web site and use DNS round robin. You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2. You need to recommend changes to the DNS records for the planned implementation. What should you recommend?

A. Create one alias (CNAME) record named Intranet. Map the CNAME record to Intranet.B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server.C. Create a new host (A) record named Intranet. Remove both host (A) records for Web1 and Web2.D. Delete one of the host (A) records named Intranet. Modify the remaining host (A) record named Intranet.

Answer: C

QUESTIONYour network contains five servers that run Windows Server 2012. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines. What should you do?

A. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual network adapters to the external virtual network switch. Configure the new virtual network adapters to use a VLAN identifier of 2.B. On each Hyper-V server, create a new private virtual network switch. From the properties of each virtual machine, add a second virtual network adapter.Connect the new virtual network adapters to the new private virtual network switches.C. On each Hyper-V server, create a new external virtual network switch. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual network adapters to the new external virtual network switches.D. From the properties of each virtual machine, enable MAC address spoofing for the existing virtual network adapter.

QUESTIONYour network contains a server named Server1 that runs Windows Server 2012. Server1 is configured as a Hyper-V host. Server1 hosts a virtual machine named VM1. VM1 is configured as a file server that runs Windows Server 2012. VM1 connects to a shared storage device by using the iSCSI Initiator. You need to back up the files and the folders in the shared storage used by VM1. The solution must ensure that open files are included in the backup. What should you do?

A. From Hyper-V Manager, create a snapshot of VM1.B. From Server1, perform a backup by using Windows Server Backup.C. From VM1, perform a backup by using Windows Server Backup.D. From Microsoft System Center 2012 Virtual Machine Manager (VMM), create a copy of VM1.

QUESTIONYour network contains three networks named LAN1, LAN2, and LAN3.You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 has three network adapters. The network adapters are configured as shown in the following table.Hyper1 hosts 10 virtual machines. A virtual machine named VM1 runs a line-of-business application that is used by all of the users of LAN1. All of the other virtual machines are connected to LAN2. You need to implement a solution to ensure that users can access VM1 if either NIC1 or NIC2 fails. What should you do?

A. From the properties of each virtual network adapter, enable network adapter teaming, and then modify the bandwidth management settings.B. From the properties of each virtual network adapter, enable network adapter teaming, and then enable virtual LAN identification.C. From the properties of each physical network adapter, enable network adapter teaming, and then add a second legacy network adapter to VM1.D. From the properties of each physical network adapter, enable network adapter teaming, and then create a virtual switch.

Answer: D

QUESTIONYour network contains an Active Directory Rights Management Services (AD RMS) cluster named Cluster1. You plan to change Cluster1 to a new AD RMS cluster named Cluster2. You need to ensure that all users retrieve the location of the AD RMS templates from Cluster2. What should you do?

A. Create an alias (CNAME) record named clusterl.contoso.com that points to Cluster2.B. Modify the Service Connection Point (SCP).C. Modify the templates file location of the rights policy templates.D. Modify the exclusion policies.